Secret sharing schemes with general access structures
From MaRDI portal
Publication:5740256
Recommendations
Cited in
(20)- Methods of encrypting monotonic access structures
- Finding the maximal adversary structure from any given access structure
- scientific article; zbMATH DE number 708832 (Why is no real title available?)
- scientific article; zbMATH DE number 1955808 (Why is no real title available?)
- Rearrangements of access structures and their realizations in secret sharing schemes
- Generalised cumulative arrays in secret sharing
- scientific article; zbMATH DE number 4179276 (Why is no real title available?)
- Extensions of access structures and their cryptographic applications
- Secret sharing schemes on general access structures.
- Realizing secret sharing with general access structure
- An efficient and secure multi-secret sharing scheme with general access structures
- Generation of key predistribution schemes using secret sharing schemes
- scientific article; zbMATH DE number 5059265 (Why is no real title available?)
- Secret sharing schemes with bipartite access structure
- Progress in Cryptology - INDOCRYPT 2003
- scientific article; zbMATH DE number 1390062 (Why is no real title available?)
- Secret-Sharing Schemes: A Survey
- Secret sharing schemes for compartmented access structures
- Secret sharing scheme with inherited characteristic
- A perfect secret sharing scheme for general access structures
This page was built for publication: Secret sharing schemes with general access structures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5740256)